Sciweavers

2386 search results - page 373 / 478
» Database Security 2000
Sort
View
KDD
2000
ACM
145views Data Mining» more  KDD 2000»
15 years 1 months ago
IntelliClean: a knowledge-based intelligent data cleaner
Existing data cleaning methods work on the basis of computing the degree of similarity between nearby records in a sorted database. High recall is achieved by accepting records wi...
Mong-Li Lee, Tok Wang Ling, Wai Lup Low
KDD
2000
ACM
110views Data Mining» more  KDD 2000»
15 years 1 months ago
An empirical analysis of techniques for constructing and searching k-dimensional trees
Affordable, fast computers with large memories have lessened the demand for program efficiency, but applications such as browsing and searching very large databases often have rat...
Douglas A. Talbert, Douglas H. Fisher
KDD
2000
ACM
118views Data Mining» more  KDD 2000»
15 years 1 months ago
Generating non-redundant association rules
The traditional association rule mining framework produces many redundant rules. The extent of redundancy is a lot larger than previously suspected. We present a new framework for...
Mohammed Javeed Zaki
KONVENS
2000
15 years 1 months ago
Automatic Labeling of Prosodic Events
An approach for a program is presented that automatically detects the position of pitch accents and intonation phrase (IP) boundaries from waveforms. The technique maps acoustic c...
Norbert Braunschweiler
KONVENS
2000
15 years 1 months ago
Evaluating Metrical Phonology - a Computational- Empirical Approach
This study aims at providing an empirical basis for the evaluation of predictions made by metrical phonology. The predictions are compared to perceptual syllable prominence annota...
Patra S. Wagner